IFIP TC6 Open Digital Library

4. WISTP 2010: Passau, Germany

Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices, 4th IFIP WG 11.2 International Workshop, WISTP 2010, Passau, Germany, April 12-14, 2010. Proceedings

Pierangela Samarati, Michael Tunstall, Joachim Posegga, Konstantinos Markantonakis, Damien Sauveron

Springer, Lecture Notes in Computer Science 6033, ISBN: 978-3-642-12367-2


Embedded Security

Efficient and Effective Buffer Overflow Protection on ARM Processors.

Raoul Strackx, Yves Younan, Pieter Philippaerts, Frank Piessens


Efficient Entropy Estimation for Mutual Information Analysis Using B-Splines.

Alexandre Venelli


A Probabilistic Diffusion Scheme for Anomaly Detection on Smartphones.

Tansu Alpcan, Christian Bauckhage, Aubrey-Derrick Schmidt


A Smart Card Implementation of the McEliece PKC.

Falko Strenzke


Evaluation Metrics of Physical Non-invasive Security.

Huiyun Li, Keke Wu, Fengqi Yu, Hai Yuan



Trust in Peer-to-Peer Content Distribution Protocols.

Nicolai Kuntze, Carsten Rudolph, Andreas Fuchs


Generic Constructions of Biometric Identity Based Encryption Systems.

Neyire Deniz Sarier


Design and Analysis of a Generalized Canvas Protocol.

Marián Novotný


Highly Constrained Embedded Systems

Efficient Mutual Authentication for Multi-domain RFID Systems Using Distributed Signatures.

Michael Braun, Ulrike Meyer, Susanne Wetzel


Practical Schemes for Privacy and Security Enhanced RFID.

Jaap-Henk Hoepman, Rieks Joosten


MoteAODV - An AODV Implementation for TinyOS 2.0.

Werner Backes, Jared Cordasco



Random Number Generation Based on Fingerprints.

Shkodran Gerguri, Václav Matyás Jr., Zdenek Ríha, Ludek Smolík


Improvements of pan-European IDM Architecture to Enable Identity Delegation Based on X.509 Proxy Certificates and SAML.

Sergio Sánchez García, Ana Gómez Oliva


Fraud Detection for Voice over IP Services on Next-Generation Networks.

Igor Ruiz-Agundez, Yoseba K. Penya, Pablo Garcia Bringas


Smart Card Security

Proxy Smart Card Systems.

Giuseppe Cattaneo, Pompeo Faruolo, Vincenzo Palazzo, Ivan Visconti


Can We Support Applications' Evolution in Multi-application Smart Cards by Security-by-Contract?

Nicola Dragoni, Olga Gadyatskaya, Fabio Massacci


Website Credential Storage and Two-Factor Web Authentication with a Java SIM.

Jonathan Hart, Konstantinos Markantonakis, Keith Mayes



Attribute-Based Encryption with Break-Glass.

Achim D. Brucker, Helmut Petritsch, Stefan G. Weber


On the Security of a Two-Factor Authentication Scheme.

Luigi Catuogno, Clemente Galdi


The Design of Secure and Efficient P2PSIP Communication Systems.

Xianghan Zheng, Vladimir A. Oleshchuk


Hardware Implementations

Novel FPGA-Based Signature Matching for Deep Packet Inspection.

Nitesh B. Guinde, Sotirios G. Ziavras


Towards Electrical, Integrated Implementations of SIMPL Systems.

Ulrich Rührmair, Qingqing Chen, Martin Stutzmann, Paolo Lugli, Ulf Schlichtmann, György Csaba


A Very Compact Hardware Implementation of the KASUMI Block Cipher.

Dai Yamamoto, Kouichi Itoh, Jun Yajima


Embedded Systems

Secure and Usable Out-Of-Band Channels for Ad Hoc Mobile Device Interactions.

Ronald Kainda, Ivan Flechais, A. W. Roscoe


Identification and Verification of Security Relevant Functions in Embedded Systems Based on Source Code Annotations and Assertions.

Johannes Loinig, Christian Steger, Reinhold Weiss, Ernst Haselsteiner


Security Analysis of Mobile Phones Used as OTP Generators.

Håvard Raddum, Lars Hopland Nestås, Kjell Jørgen Hole


An Energy-Efficient Symmetric Cryptography Based Authentication Scheme for Wireless Sensor Networks.

Oscar Delgado-Mohatar, José M. Sierra, Ljiljana Brankovic, Amparo Fúster-Sabater


Anonymity/Database Security

The Market Failure of Anonymity Services.

Heiko Rossnagel


Exploiting Node Mobility for Coordinating Data Usage in Crisis Scenarios.

Giovanni Russello, Enrico Scalavino


Predicting and Preventing Insider Threat in Relational Database Systems.

Qussai Yaseen, Brajendra Panda